SecurityFocus Microsoft Newsletter #278
----------------------------------------

This Issue is Sponsored By: SpiDynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step"!" - White Paper Blind SQL Injection can deliver total control of your server to a hacker giving them the ability to read, write and manipulate all data stored in your backend systems! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000C3f7

------------------------------------------------------------------
I.   FRONT AND CENTER
       1. Coffee shop WiFi for dummies
       2. Sebek 3: tracking the attackers, part two
       3. Privacy and anonymity
II.  MICROSOFT VULNERABILITY SUMMARY
       1. PostgreSQL Set Session Authorization Denial of Service Vulnerability
       2. PostgreSQL Remote SET ROLE Privilege Escalation Vulnerability
       3. Microsoft Windows IGMPv3 Denial of Service Vulnerability
       4. Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability
5. Microsoft Windows Korean Input Method Editor Privilege Escalation Vulnerability
       6. SSH Tectia Server Remote Format String Vulnerability
       7. Microsoft Windows Web Client Buffer Overflow Vulnerability
       8. Isode M-Vault Server LDAP Memory Corruption Vulnerability
       9. Microsoft PowerPoint 2000 Remote Information Disclosure Vulnerability
10. Microsoft Windows Media Player Bitmap Handling Buffer Overflow Vulnerability
       11. eStara Softphone Multiple Denial of Service Vulnerabilities
12. AttachmateWRQ Reflection for Secure IT Remote Format String Vulnerability
       13. Nullsoft Winamp M3U File Denial of Service Vulnerability
       14. Microsoft February Advance Notification Multiple Vulnerabilities
15. HP Systems Insight Manager Unspecified Directory Traversal Vulnerability
       16. Sun ONE Directory Server Remote Denial Of Service Vulnerability
       17. Lotus Domino LDAP Denial of Service Vulnerability
       18. Ritlabs The Bat! Message Header Spoofing Weakness
III. MICROSOFT FOCUS LIST SUMMARY
       1. SecurityFocus Microsoft Newsletter #277
       2. SNMP service
IV.  UNSUBSCRIBE INSTRUCTIONS
V.   SPONSOR INFORMATION

I.   FRONT AND CENTER
---------------------
1. Coffee shop WiFi for dummies
By Scott Granneman
The average user has no idea of the risks associated with public WiFi hotspots. Here are some very simple tips for them to keep their network access secure.
http://www.securityfocus.com/columnists/385

2. Sebek 3: tracking the attackers, part two
By Raul Siles, GSE
The second article in this honeypot series discusses best practices for deploying Sebek 3 inside a GenIII honepot, and shows how to patch Sebek to watch all the attacker's activities in real-time.
http://www.securityfocus.com/infocus/1858

3. Privacy and anonymity
By Kelly Martin
Privacy and anonymity on the Internet are as important as they are difficult to achieve. Here are some of the the current issues we face, along with a few suggestions on how we can become a little more anonymous on the Web.
http://www.securityfocus.com/columnists/386


II.  MICROSOFT VULNERABILITY SUMMARY
------------------------------------
1. PostgreSQL Set Session Authorization Denial of Service Vulnerability
BugTraq ID: 16650
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16650
Summary:
PostgreSQL is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to crash the application, effectively denying service to legitimate users.

Successful exploitation of this issue requires that the application is compiled with 'Asserts' enabled; this is not the default setting.

2. PostgreSQL Remote SET ROLE Privilege Escalation Vulnerability
BugTraq ID: 16649
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16649
Summary:
PostgreSQL is susceptible to a remote privilege escalation vulnerability. This issue is due to a flaw in the error path of the 'SET ROLE' function.

This issue allows remote attackers with database access to gain administrative access to affected database servers. As administrative access to the database allows filesystem access, other attacks against the underlying operating system may also be possible.

3. Microsoft Windows IGMPv3 Denial of Service Vulnerability
BugTraq ID: 16645
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16645
Summary:
A vulnerability in the handling of IGMPv3 (Internet Group Management Protocol) packets could result in a denial of service.

An attacker can exploit this issue through a broadcast attack to cause vulnerable computers on the subnet to become unresponsive, effectively denying service to legitimate users.

4. Microsoft Windows Media Player Plugin Buffer Overflow Vulnerability
BugTraq ID: 16644
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16644
Summary:
The Microsoft Windows Media Player plugin for non-Microsoft browsers is prone to a buffer overflow vulnerability. This issue is due to a failure in the application to do proper bounds checking on user-supplied data before using it in a finite sized buffer.

An attacker can exploit this issue to execute arbitrary code on the victim userĂ¢??s computer in the context of the victim user. This may facilitate a compromise of the affected computer.

This issue is only exploitable through non-Microsoft browsers that have the Media Player plugin installed. Possible browsers include Firefox versions .9 and later and Netscape version 8; other browsers with the plugin installed may also be affected.

5. Microsoft Windows Korean Input Method Editor Privilege Escalation Vulnerability
BugTraq ID: 16643
Remote: No
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16643
Summary:
Microsoft Windows Korean Input Method Editor is prone to a local privilege escalation vulnerability.

Successful exploitation can allow local attackers to completely compromise a vulnerable computer.

6. SSH Tectia Server Remote Format String Vulnerability
BugTraq ID: 16640
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16640
Summary:
A remote format-string vulnerability affects SSH Tectia Server. The application fails to properly sanitize user-supplied input data before using it in a formatted-printing function.

A remote attacker may leverage this issue to execute arbitrary machine code, possibly allowing for privilege escalation and for the bypassing of SFTP-only access controls on affected SSH servers.

7. Microsoft Windows Web Client Buffer Overflow Vulnerability
BugTraq ID: 16636
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16636
Summary:
The Microsoft Windows Web Client is prone to a buffer overflow. Successful exploitation could allow arbitrary code execution with System privileges.

8. Isode M-Vault Server LDAP Memory Corruption Vulnerability
BugTraq ID: 16635
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16635
Summary:
Isode M-Vault Server is prone to a memory corruption. This issue may be triggered by malformed LDAP data.

The exact impact of this vulnerability is not known at this time. Although the issue is known to crash the server, the possibility of remote code execution is unconfirmed.

The vulnerability was reported for version 11.3 on the Linux platform; other versions and platforms may also be affected.

This vulnerability will be updated as further information is made available.

9. Microsoft PowerPoint 2000 Remote Information Disclosure Vulnerability
BugTraq ID: 16634
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16634
Summary:
Microsoft PowerPoint 2000 is prone to a remote information disclosure vulnerability. Information gathered may be used to launch further attacks against a vulnerable computer.

10. Microsoft Windows Media Player Bitmap Handling Buffer Overflow Vulnerability
BugTraq ID: 16633
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16633
Summary:
Microsoft Windows Media Player is prone to a remote buffer overflow vulnerability.

The vulnerability arises when the application handles a skin file containing a specially crafted Bitmap image. This issue can also be triggered by just supplying a malicious Bitmap to the application, however, it should be noted that Windows Media Player is not the default handler for bitmap files.

A successful attack can corrupt process memory and result in arbitrary code execution. This may facilitate a remote compromise in the context of the vulnerable user.

11. eStara Softphone Multiple Denial of Service Vulnerabilities
BugTraq ID: 16629
Remote: Yes
Date Published: 2006-02-14
Relevant URL: http://www.securityfocus.com/bid/16629
Summary:
eStara Smartphone is prone to multiple denial-of-service vulnerabilities when processing malformed VOIP headers. Successful exploitation will cause the device to crash.

12. AttachmateWRQ Reflection for Secure IT Remote Format String Vulnerability
BugTraq ID: 16625
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16625
Summary:
A remote format-string vulnerability affects AttachmateWRQ Reflection for Secure IT. The application fails to properly sanitize user-supplied input data before using it in a formatted-printing function.

A remote attacker may leverage this issue to execute arbitrary machine code, possibly allowing for privilege escalation and for the bypassing of SFTP-only access controls on affected SSH servers. Attackers may also cause a denial-of-service condition against the affected SSH server.

13. Nullsoft Winamp M3U File Denial of Service Vulnerability
BugTraq ID: 16623
Remote: Yes
Date Published: 2006-02-13
Relevant URL: http://www.securityfocus.com/bid/16623
Summary:
Winamp is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to crash the application, effectively denying service to legitimate users. An attacker may be able to exploit this issue to execute arbitrary code on the victim user's computer; this has not been confirmed.

This issue is reported to affect version 5.13; other versions may also be vulnerable.

This issue may be related to BID 9923 (NullSoft Winamp Malformed File Name Denial of Service Vulnerability).

14. Microsoft February Advance Notification Multiple Vulnerabilities
BugTraq ID: 16575
Remote: Yes
Date Published: 2006-02-09
Relevant URL: http://www.securityfocus.com/bid/16575
Summary:
Microsoft has released advanced notification that they will be releasing seven security bulletins for Windows on February 14, 2006. The highest severity rating for these issues is Critical.

Further details about these issues are not currently available. Individual BIDs will be created and this record will be removed when the security bulletins are released.

15. HP Systems Insight Manager Unspecified Directory Traversal Vulnerability
BugTraq ID: 16571
Remote: Yes
Date Published: 2006-02-09
Relevant URL: http://www.securityfocus.com/bid/16571
Summary:
HP Systems Insight Manager (SIM) is prone to an unspecified directory-traversal vulnerability. This issue is most likely due to a failure in the application to properly sanitize user-supplied input.

Presumably, an attacker can exploit this issue to retrieve arbitrary files in the context of the affected application. This issue may also permit the overwriting of arbitrary files.

The exact nature of this vulnerability is not currently known; this BID will be updated as further information becomes available.

This issue affects only HP SIM on Microsoft Windows 2000, 2003, and XP.

16. Sun ONE Directory Server Remote Denial Of Service Vulnerability
BugTraq ID: 16550
Remote: Yes
Date Published: 2006-02-08
Relevant URL: http://www.securityfocus.com/bid/16550
Summary:
Sun ONE Directory Server is prone to a remote denial-of-service vulnerability. This issue is due to the application's failure to handle malformed network traffic.

This issue allows remote attackers to crash the application, denying service to legitimate users.

17. Lotus Domino LDAP Denial of Service Vulnerability
BugTraq ID: 16523
Remote: Yes
Date Published: 2006-02-07
Relevant URL: http://www.securityfocus.com/bid/16523
Summary:
Lotus Domino LDAP server is prone to a denial-of-service vulnerability when handling malformed requests.

Lotus Domino version 7.0 is vulnerable; earlier versions may also be affected.

18. Ritlabs The Bat! Message Header Spoofing Weakness
BugTraq ID: 16515
Remote: Yes
Date Published: 2006-02-06
Relevant URL: http://www.securityfocus.com/bid/16515
Summary:
The Bat! is prone to a message-header-spoofing weakness.

Potentially malicious or unwanted email may be untraceable and difficult to block.

III. MICROSOFT FOCUS LIST SUMMARY
---------------------------------
1. SecurityFocus Microsoft Newsletter #277
http://www.securityfocus.com/archive/88/424635

2. SNMP service
http://www.securityfocus.com/archive/88/424634

IV.  UNSUBSCRIBE INSTRUCTIONS
-----------------------------
To unsubscribe send an e-mail message to [EMAIL PROTECTED] from the subscribed address. The contents of the subject or message body do not matter. You will receive a confirmation request message to which you will have to answer. Alternatively you can also visit http://www.securityfocus.com/newsletters and unsubscribe via the website.

If your email address has changed email [EMAIL PROTECTED] and ask to be manually removed.

V.   SPONSOR INFORMATION
------------------------
This Issue is Sponsored By: SpiDynamics

ALERT: "How A Hacker Launches A Blind SQL Injection Attack Step-by-Step"!" - White Paper Blind SQL Injection can deliver total control of your server to a hacker giving them the ability to read, write and manipulate all data stored in your backend systems! Download this *FREE* white paper from SPI Dynamics for a complete guide to protection!

https://download.spidynamics.com/1/ad/bsq.asp?Campaign_ID=70130000000C3f7



---------------------------------------------------------------------------
---------------------------------------------------------------------------

Reply via email to